ansible-error-handling
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: The skill is entirely instructional, providing patterns for Ansible playbook development without including malicious scripts or obfuscated code.
- [COMMAND_EXECUTION]: The skill demonstrates the use of Ansible's command and shell modules for system management. It promotes security and reliability by showing how to use
changed_whenandfailed_whento ensure tasks are idempotent and handle expected errors correctly. - [EXTERNAL_DOWNLOADS]: Examples include the use of
ansible.builtin.get_urlto download software packages. The provided URLs use theexample.comdomain for illustrative purposes and do not point to untrusted or malicious remote code. - [CREDENTIALS_UNSAFE]: The skill advocates for the use of
no_log: truewhen tasks interact with sensitive data, such as API tokens, which prevents credentials from being exposed in Ansible's execution logs. - [SAFE]: Input validation is emphasized through the use of
ansible.builtin.assertwith regular expression matching, which helps mitigate risks associated with untrusted variable injection in automation scripts.
Audit Metadata